Literature Database

Certified Robustness to Adversarial Examples with Differential Privacy

Authors: Mathias Lecuyer, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Suman Jana | Published: 2018-02-09 | Updated: 2019-05-29
Robustness Evaluation
Adversarial Example
Adversarial Learning

URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection

Authors: Hung Le, Quang Pham, Doyen Sahoo, Steven C. H. Hoi | Published: 2018-02-09 | Updated: 2018-03-02
Membership Inference
Model Inversion
Machine Learning Method

Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection

Authors: Andrea Paudice, Luis Muñoz-González, Andras Gyorgy, Emil C. Lupu | Published: 2018-02-08
Poisoning
Adversarial attack
Detection of Poisonous Data

A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines

Authors: Rui Zhang, Quanyan Zhu | Published: 2018-02-07
Multi-Objective Optimization
Adversarial attack
Machine Learning Method

CryptoRec: Privacy-preserving Recommendation as a Service

Authors: Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan | Published: 2018-02-07 | Updated: 2018-05-13
Privacy Protection Mechanism
Differential Privacy
Machine Learning Method

ModelChain: Decentralized Privacy-Preserving Healthcare Predictive Modeling Framework on Private Blockchain Networks

Authors: Tsung-Ting Kuo, Lucila Ohno-Machado | Published: 2018-02-06
Privacy Protection Mechanism
Blockchain Integration
Machine Learning Method

Blind Pre-Processing: A Robust Defense Method Against Adversarial Examples

Authors: Adnan Siraj Rakin, Zhezhi He, Boqing Gong, Deliang Fan | Published: 2018-02-05 | Updated: 2018-02-07
Data Preprocessing
Certified Robustness
Adversarial Learning

IntelliAV: Building an Effective On-Device Android Malware Detector

Authors: Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto | Published: 2018-02-04
Risk Assessment
Machine Learning Method
Feature Extraction

Secure Range Queries for Multiple Users

Authors: Anselme Tueno, Florian Kerschbaum | Published: 2018-02-04
Privacy-Preserving Algorithm
Privacy Protection Mechanism
Secure Arithmetic Computation

Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach

Authors: Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Gao, Cho-Jui Hsieh, Luca Daniel | Published: 2018-01-31
Certified Robustness
Robustness Evaluation
Adversarial attack